The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] CA CleverPath SQL Injection


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 25 Apr 2007 16:58:03 +0200
Subject: [NT] CA CleverPath SQL Injection
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20070425141809.C5B3F5806@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  CA CleverPath SQL Injection
------------------------------------------------------------------------


SUMMARY

The CA Clever Path Portal is a customizable portal for aggregation and 
integration of data and applications. It is integrated into multiple CA 
products including various Unicenter components. The CA CleverPath 
utilizes a back end Database for storing data and allows usage of either 
built in or external Database.

After identifying in CleverPath an irregular behavior when modifying query 
parameters in the search mechanism, Hacktics has conducted a research of 
identifying an SQL Injection vulnerability in the implementation of the 
search query construction.

DETAILS

By modifying certain parameters in the execute search URL, it was possible 
to cause the  application to send to the database queries that are 
different than those originally  intended by the search engine, and as a 
result retrieving the entire database contents  according to the 
application user permissions scheme in the database.

Note: Due to the diversity of possible Database implementations for 
CleverPath, the actual level of possible exploitation may vary between 
different systems.

Exploit Details:
Due to the complexity of the required syntax, the identified SQL injection 
does not allow for trivial exploitation such as UNION SELECT. However, 
data can be still retrieved using Binary Search techniques.

For detailed technical description and exploit please visit  
<http://www.hacktics.com/AdvCleverPathApr07.html>; 
http://www.hacktics.com/AdvCleverPathApr07.html

Solution:
CA Has been notified of this vulnerability on Januarty 18th, and is 
releasing a patch together with the publication of the vulnerability.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:irene@hacktics.com.> Irene 
Abezgauz.
The original article can be found at:  
<http://www.hacktics.com/AdvCleverPathApr07.html>; 
http://www.hacktics.com/AdvCleverPathApr07.html




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру